Script fingerprinting systems based on shodan.io data
☆13Jul 9, 2018Updated 7 years ago
Alternatives and similar repositories for shodan_fingerprinter
Users that are interested in shodan_fingerprinter are comparing it to the libraries listed below
Sorting:
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 3 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- Voice Input to USB HID Output. Based on STM32WB55☆21Oct 2, 2025Updated 5 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- This script contains code to convert your bulk email-pass combolist into userpass!☆12May 30, 2025Updated 9 months ago
- Seqnature: incorporate SNPs and Indels into a reference genome☆16Sep 6, 2016Updated 9 years ago
- Gojira is a record and replay framework for Java apps meant for regression testing. It provides complete recording capability within a si…☆13Feb 5, 2025Updated last year
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- Gedit 3 python plugin for recording a playingback macros.☆15Apr 5, 2017Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- Scapy Robot Framework Library☆10Oct 22, 2019Updated 6 years ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- Wireshark Lua plugin to generate pcapng test capture files☆11Aug 31, 2015Updated 10 years ago
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago
- CVE-2021-33766-poc☆11Sep 15, 2021Updated 4 years ago
- ☆10Jan 16, 2021Updated 5 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- PTF-based data plane tests for ONOS fabric.p4☆15Aug 6, 2021Updated 4 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- An analysis of the released data on FinCrime Files transactions as depicted on SARs.☆10Nov 26, 2020Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- A list of curated OpenSearch links☆11May 17, 2024Updated last year
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Udev helper for naming devices per BIOS names☆19Sep 21, 2023Updated 2 years ago
- The Tragedy of the CO₂mmons☆10Feb 7, 2020Updated 6 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- 🧠 A field guide to mnemonics for engineers: outages, RCAs, infra design, burnout, and conflict. Structured entries with when-to-use, pit…☆16Feb 1, 2026Updated last month
- Python library for grayhatwarfare.com with small hacks☆16Aug 5, 2020Updated 5 years ago
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆14Jun 8, 2021Updated 4 years ago
- EECS4080 Project at York University. A distribute proxy system to circumvent content filtering firewall. Data units are randomly distribu…☆13Oct 23, 2019Updated 6 years ago
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- The Trader Gateway of Distributed Commodities OTC Electronic Trading System☆13Jun 12, 2018Updated 7 years ago
- Neuralizer.ai - Visual Neural Network Designer☆14Nov 8, 2022Updated 3 years ago
- TreeNET is a subnet-based topology discovery tool which is built upon ExploreNET, a subnet inference tool.☆11Oct 14, 2019Updated 6 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago